IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Multimedia (View All Report Types)
1 - 25 of 180 Matches Previous Page  |  Next Page
Your App Security Stack: How to Defend Against the Evolving Threat
sponsored by Arxan
WEBCAST: In this webcast, Ken Jochims from Arxan sits down with Forrester Research Principal Analyst, Amy DeMartine, to talk about app security and the evolving threat landscape in 2019.
Posted: 15 Feb 2019 | Premiered: Feb 15, 2019

TOPICS: 
Arxan

Trust But Verify: Mobile App Protection Best Practices
sponsored by Arxan
WEBCAST: This webcast explores how to evolve app security to face modern day threats and stop them before they can spread across your network. Discover a set of best practices for app security and threat mitigation, plus learn about Arxan's comprehensive app protection and alerting capabilities.
Posted: 15 Feb 2019 | Premiered: Feb 15, 2019

TOPICS: 
Arxan

The Power of Bro and Why You Should Include It in Your Security Infrastructure
sponsored by CoreLight
VIDEO: Tune into this webinar as Matt Bromiley of SANS Institute and Seth Hall of CoreLight, explain the power of Bro, where it fits in the security landscape and how it can help incident responders do their jobs quickly and effectively.
Posted: 11 Feb 2019 | Premiered: 11 Feb 2019

TOPICS: 
CoreLight

Cyber Global Warming Real Life Malscape Insights
sponsored by Dell SecureWorks
WEBCAST: In this webcast, learn how you can measure your cyber-resilience with behavioral intelligence.
Posted: 07 Feb 2019 | Premiered: Oct 2, 2018

TOPICS: 
Dell SecureWorks

How Cybercriminals are Adapting to Outwit Defenses
sponsored by Dell SecureWorks
WEBCAST: From July 2017 through June 2018, SecureWorks Counter Threat Unit researchers analyzed incident response outcomes and conducted original research to gain insight into threat activity and behavior across 4,400 companies. In this webcast, gain insight on the key findings from the report.
Posted: 06 Feb 2019 | Premiered: Dec 5, 2018

TOPICS: 
Dell SecureWorks

An Overview of Endpoint Detection & Response (EDR)
sponsored by Trend Micro, Inc.
WEBCAST: ESG Senior Principal Analyst Jon Oltsik discusses an overview of Endpoint Detection & Response (EDR) in the market, including trends, challenges, and how automation can help.
Posted: 06 Feb 2019 | Premiered: Mar 23, 2018

TOPICS: 
Trend Micro, Inc.

How to Reduce Security Risks through Better DNS Visibility & Analysis
sponsored by CoreLight
WEBCAST: In this webcast, find out how you can drive visibility into DNS traffic so that you can create a strong security analytics strategy that enables you to reduce risks for your network.
Posted: 04 Feb 2019 | Premiered: Jan 9, 2019

TOPICS: 
CoreLight

The IT Security Confidant Vanishing Perimeter Pickup Sub
sponsored by Symantec
WEBCAST: See the benefits of Symantec Web Security Services today.
Posted: 01 Feb 2019 | Premiered: Feb 1, 2019

TOPICS: 
Symantec

The IT Security Confidant: Mobile Security
sponsored by Symantec
VIDEO: In this video, learn about Comprehensive Mobile Endpoint Protection and learn how you can fight off the latest mobile threats without slowing down your devices.
Posted: 31 Jan 2019 | Premiered: 31 Jan 2019

TOPICS: 
Symantec

The IT Security Confidant Vanishing Perimeter Sub
sponsored by Symantec
WEBCAST: The world of IT security has seen a vanishing perimeter in recent years. This has resulted from the increased usage of cloud which has made it for difficult for companies to secure mobile devices. In this webcast, learn about a simple, complete and cost-effective cloud security solution from Symantec.
Posted: 31 Jan 2019 | Premiered: Jan 31, 2019

TOPICS: 
Symantec

The IT Security Confidant Pickup
sponsored by Symantec
VIDEO: Download this video to see the benefits of Symantec Endpoint Protection Mobile.
Posted: 31 Jan 2019 | Premiered: 31 Jan 2019

TOPICS: 
Symantec

The Mobile Security Confidant
sponsored by Symantec
WEBCAST: Watch this brief video to learn about a comprehensive endpoint protection platform that's deployable in minutes, manageable from anywhere, and won't slow users' devices.
Posted: 30 Jan 2019 | Premiered: Jan 30, 2019

TOPICS: 
Symantec

Ten Strategies of a World-Class Security Operations Center
sponsored by CoreLight
WEBCAST: The global talent shortage for cybersecurity skills means that the average SOC is a lean group with the enormous task of protecting the organization. Therefore, it's of critical importance to design and operate your SOC to maximize efficiency. In this webcast, learn best practices that can transform a common security team into an elite SOC.
Posted: 28 Jan 2019 | Premiered: May 23, 2018

TOPICS: 
CoreLight

Corelight Webcast: New SIEM on the Block -- Meet Humio
sponsored by CoreLight
WEBCAST: Bro network security monitoring is an open source tool. It turns raw network traffic into comprehensive network logs organized by protocol, with key fields extracted specifically for security use cases. In this webcast, watch a demo to see how Corelight's technical integration with Humio allows you to economically monitor all your network traffic.
Posted: 28 Jan 2019 | Premiered: Aug 21, 2018

TOPICS: 
CoreLight

How Neustar SiteProtect NG Safeguards its Customers
sponsored by Neustar
VIDEO: In this video, hear from 6 Security and Network professionals on how their leading businesses were able to mitigate DDoS attacks using Neustar SiteProtect NG.
Posted: 18 Jan 2019 | Premiered: 16 Jan 2019

TOPICS: 
Neustar

How Permanent TSB Protects its Online Banking System from DDoS Attacks
sponsored by Neustar
VIDEO: Permanent TSB, the third largest Irish provider of personal retail banking services in Ireland, needed to protect their online banking services from harmful DDoS attacks. Read one to find out they accomplished DDoS security.
Posted: 18 Jan 2019 | Premiered: 18 Jan 2019

TOPICS: 
Neustar

SANS Product Review Webinar
sponsored by WhiteSource
WEBCAST: Whitesource's open source security solution helps automate the finding of vulnerabilities and open source components and then bridges the gap between development and security professionals. In this webcast, Serge Borso will share his experiences working with Whitesource over the last couple of months.
Posted: 14 Jan 2019 | Premiered: Oct 3, 2018

TOPICS: 
WhiteSource

DomainTools Guide to Threat Hunting with Splunk and Phantom
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. The first step to integrating threat hunting into your organization is establishing a true threat hunting program. In this webcast, learn about a number of threat hunting essentials.
Posted: 14 Jan 2019 | Premiered: Jan 14, 2019

TOPICS: 
DomainTools

SANS Fingerprinting Threat Actors with Web Assets
sponsored by DomainTools
WEBCAST: Threat intelligence helps companies better predict the actions of threat actors to stay ahead of their attacks. In order to do this, organizations must learn more about the enemy. In this webcast, SANS instructor Rebekah Brown and Data Systems Engineer at DomainTools, Mike Thompson discuss ways to better fingerprint threat actors.
Posted: 11 Jan 2019 | Premiered: May 31, 2018

TOPICS: 
DomainTools

2019: No Oscars for Bad Threat Actors
sponsored by DomainTools
WEBCAST: There has been a massive increase in the number and types of cybersecurity threats over the years. In this webcast, experts from DomainTools discuss some cyber forecasts and predictions for the coming years including IoT devices, automation, breaches and more.
Posted: 10 Jan 2019 | Premiered: Dec 31, 2018

TOPICS: 
DomainTools

The State of Open Source Vulnerabilities Management
sponsored by WhiteSource
WEBCAST: Open source software has become an indispensible part of the software industry. However, development and security teams are challenged to meet open source security objectives, without compromising on speed and quality. This webcast discusses the key strategy for effective vulnerability management.
Posted: 09 Jan 2019 | Premiered: Nov 15, 2018

TOPICS: 
WhiteSource

A New SIEM for a New World
sponsored by Empow Cyber Security
WEBCAST: With the rise of digital business, attack surfaces have expanded, data has become more abundant and complex and alerts have become a hindrance rather than a help. Traditional SIEMs aren't able to keep up with this new environment. Watch this webinar to learn about the kind of SIEM today's dynamic world requires.
Posted: 27 Dec 2018 | Premiered: Dec 27, 2018

TOPICS: 
Empow Cyber Security

Cybersecurity Operations: Realities and Strategies
sponsored by Empow Cyber Security
WEBCAST: Traditional cybersecurity technologies were not built for today's dynamic environments. They were designed for a simpler time, but the world has changed and security strategies and technologies must change with it. Listen as Jon Oltsik, Senior Principal Analyst at ESG discusses how to keep your organization safe.
Posted: 27 Dec 2018 | Premiered: Dec 27, 2018

TOPICS: 
Empow Cyber Security

How Natural Language Processing Can Automate Your SIEM
sponsored by Empow Cyber Security
WEBCAST: IT environments are growing more complex and bloated, but there aren't enough trained and knowledgeable security professionals available to manage and protect environments. In this webcast, Donnelly Financial's CISO Dannie Combs discusses how they tackled the cybersecurity skills shortage using next-gen SIEM.
Posted: 27 Dec 2018 | Premiered: Dec 27, 2018

TOPICS: 
Empow Cyber Security

SecureWorks and McLaren Partnership
sponsored by Dell SecureWorks
VIDEO: SecureWorks is the security partner of McLaren Group. Using SecureWorks has allowed McLaren to accelerate threat detection. SecureWorks applies machine learning as well as human and artificial intelligence to process logs. In this webcast, Jonathan Neal and Paul Brimacombe discuss their experience partnering with SecureWorks.
Posted: 12 Dec 2018 | Premiered: 10 Dec 2018

TOPICS: 
Dell SecureWorks
1 - 25 of 180 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement